{"id":32685,"date":"2023-06-21T04:00:00","date_gmt":"2023-06-21T11:00:00","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=32685"},"modified":"2023-06-21T16:10:45","modified_gmt":"2023-06-21T23:10:45","slug":"saas-security-requires-self-supervised-learning-with-context","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/","title":{"rendered":"SaaS Security Requires Self-Supervised Learning with Context"},"content":{"rendered":"\n<p>It\u2019s estimated that some 70% of the business applications companies use are SaaS-based \u2013 and that percentage continues to grow. While this has undoubtedly improved efficiency, productivity and collaboration for many companies, it\u2019s also created an expanded attack surface and new entry points. For many organizations, there\u2019s a lack of&nbsp;overall visibility into the users and data for the SaaS applications used. And that\u2019s scary, because it\u2019s almost impossible to secure and protect what you can\u2019t see (and may not be aware of.)&nbsp;&nbsp;<\/p>\n\n\n\n<p>IT teams need a way to enforce security policies and ensure that sensitive data isn\u2019t being inappropriately shared via these tools. And they need to be able to do this without having a significant impact on efficiency and productivity.<\/p>\n\n\n\n<p>It might be tempting to try and address SaaS security concerns by simply applying \u201cautomation\u201d and setting some overarching rules, but the problem with this approach is that sometimes you throw out the baby with the bathwater. In other words, you can wind up preventing employees from doing work or sharing sensitive information that they need to do. This is where the idea of self-supervised learning can help apply policies and rules with context.<\/p>\n\n\n\n<p><strong>The challenges of a \u201cset it and forget it\u201d approach&nbsp;<\/strong><\/p>\n\n\n\n<p>Automation is key to addressing the challenge of securing SaaS data, but it can\u2019t be done without the proper context.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Let\u2019s say you set it up so that your system will automatically prevent or block any exchange involving sensitive information. Here\u2019s the problem with that approach: Most of the time when someone shares sensitive information, it\u2019s necessary to fulfill their job role \u2013 especially if they\u2019re working in a function such as human resources or finance that deals with a lot of sensitive information. A workflow that automatically prevents sensitive information being shared could end up having a significant impact on these departments\u2019 ability to do their work.<\/p>\n\n\n\n<p>Even if you take a more measured approach \u2013 let\u2019s say you set it up so that sensitive information can be shared, but users will lose access after a specific period of time \u2013 that can also have a negative impact on workflow and productivity. And it still doesn\u2019t solve the problem of protecting access to that sensitive information in the first place.&nbsp;<\/p>\n\n\n\n<p>Automation isn\u2019t something that can just be broadly applied in a blanket manner when it comes to SaaS tools and data. What you need is context.&nbsp;<\/p>\n\n\n\n<p><strong>Creating a more contextualized process<\/strong><\/p>\n\n\n\n<p>Context applied to automation can help decrease risk and address issues without introducing unnecessary friction. It\u2019s a way to find a happy medium between business goals and security goals.&nbsp;<\/p>\n\n\n\n<p>When evaluating an action to determine whether it is appropriate, context refers to the capacity to comprehend the larger ecosystem. With this information in hand, a security team can determine who collaborates with whom; determine who has permission to use particular tools, systems or data; and decide whether a given activity is appropriate.<\/p>\n\n\n\n<p>With a self-supervised learning approach, the model can train itself using the data it has been given. It doesn\u2019t require explicit labels or instructions from humans. Self-supervised learning can be used to analyze the connections between employees and understand the patterns of communication and collaboration within a company. The model can learn about the normal behavior and identify any abnormal or anomalous behavior, which can be used to improve security and protect sensitive information. Additionally, it can also help to provide a more accurate and efficient way of mapping sensitive data.<\/p>\n\n\n\n<p><strong>Getting started with self-supervised learning&nbsp;<\/strong><\/p>\n\n\n\n<p>With self-supervised learning, you can gain an understanding of the organizational context and mapping sensitive data based on that context. This allows the algorithm to learn what normal or good behavior looks like and identify any abnormal or anomalous behavior that could indicate a security risk.<\/p>\n\n\n\n<p>To start, you will need to connect your main collaboration tools via an API, such as O365, Slack, Github, or GoogleWorkspace. Self-supervised learning\u2019s advanced analytics will crunch the history data and use it to train the algorithm. Once the algorithm has been trained, you can begin using it to monitor your organization&#8217;s activities and identify potential security risks. The algorithm will continuously learn and adapt.<\/p>\n\n\n\n<p>Once the self-supervised model has a good understanding of your organizational context, it will allow you to configure policies and workflows that are specific to your organization. Furthermore, you\u2019ll be able to use that information to add context to your existing policies and automated workflows.<\/p>\n\n\n\n<p>Another benefit is that the analytics will automatically detect exposure of sensitive data based on the context learned. A security analyst\u2019s role will be to monitor the output of the self-supervised learning system, and to make any necessary adjustments to the data or business policies and actions that it generates.<\/p>\n\n\n\n<p><strong>Augmenting human intelligence<\/strong><\/p>\n\n\n\n<p>It is important to keep in mind that self-supervised learning is not a replacement for human oversight and analysis. Security analysts should regularly review the model&#8217;s output and use their own expertise to make final decisions on security policies and automation.<\/p>\n\n\n\n<p>To get the best results, it\u2019s important to work closely with experts in the associated business groups and security to ensure that the model is properly configured and implemented. This will allow you to get the most out of your security applications and protect your organization&#8217;s sensitive data.&nbsp;<\/p>\n\n\n\n<p>With the right approach, your self-supervised learning analytics can be a powerful tool for securing SaaS applications. When configuring automation and policies based on a context generated by self-supervised learning, it&#8217;s important to start by understanding your organization&#8217;s unique needs as not every organization is the same. This includes identifying the sensitive data that needs to be protected and understanding the typical behavior of users on an organizational social network graph.<\/p>\n\n\n\n<p>Additionally, it&#8217;s important to be transparent about how the model is making decisions and to ensure that it is explainable and trustworthy.&nbsp;<\/p>\n\n\n\n<p><strong>Self-supervised for SaaS security<\/strong><\/p>\n\n\n\n<p>SaaS tools and apps have revolutionized the workplace in many ways \u2013 and we certainly don\u2019t want to put an end to that. But organizations do need to think carefully about the security implications of these apps and the sensitive data that\u2019s being shared within and across them. An approach based on self-supervised learning can help improve your organization&#8217;s security posture by providing a more agile and context-aware approach to security. The ability of the system to continuously learn and adapt to the changing environment of your organization, helps to identify and handle security threats in a more efficient and effective way while facilitating the normal day-to-day business functions.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>About the Author<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"150\" height=\"151\" src=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/06\/Tal_Shapira.png\" alt=\"\" class=\"wp-image-32686\" srcset=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/06\/Tal_Shapira.png 150w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/06\/Tal_Shapira-300x300.png 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/figure><\/div>\n\n\n<p><em>Tal Shapira, Ph.D., is the co-founder and chief scientist at Reco, a collaboration security company that delivers unprecedented visibility, detection and control over information shared in collaboration platforms like Slack, Microsoft 365 and Google Workspace. He is a graduate of the Taipot Excellence Program, with an in-depth knowledge of data science, deep learning, big data and cybersecurity R&amp;D, with a demonstrated history of working in the military industry. He was previously head of cybersecurity group within the Israeli prime minister\u2019s office and served as head of algorithms at Guardian Optical Technologies, which was acquired by Gentex.<\/em><\/p>\n\n\n\n<p><em>Sign up for the free insideBIGDATA&nbsp;<a href=\"http:\/\/inside-bigdata.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">newsletter<\/a>.<\/em><\/p>\n\n\n\n<p><em>Join us on Twitter:&nbsp;<a href=\"https:\/\/twitter.com\/InsideBigData1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/InsideBigData1<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on LinkedIn:&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/insidebigdata\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/company\/insidebigdata\/<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on Facebook:&nbsp;<a href=\"https:\/\/www.facebook.com\/insideBIGDATANOW\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.facebook.com\/insideBIGDATANOW<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this contributed article, Tal Shapira, Ph.D., co-founder and chief scientist at Reco, discusses the need for self-supervised learning to combat the growing attack surface that SaaS-based applications have opened up for organizations. SaaS tools and applications have revolutionized the workplace in many ways \u2013 and we certainly don\u2019t want to put an end to that. But organizations must think carefully about the security implications of these apps and the sensitive<br \/>\n data that\u2019s being shared within and across them. In his piece, Tal explains that an approach based on self-supervised learning can help improve an organization\u2019s security posture by providing a more agile and context-aware approach to security. <\/p>\n","protected":false},"author":10513,"featured_media":22592,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[115,182,180,61,67,56,1],"tags":[446,110,1322,96],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SaaS Security Requires Self-Supervised Learning with Context - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SaaS Security Requires Self-Supervised Learning with Context - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"In this contributed article, Tal Shapira, Ph.D., co-founder and chief scientist at Reco, discusses the need for self-supervised learning to combat the growing attack surface that SaaS-based applications have opened up for organizations. SaaS tools and applications have revolutionized the workplace in many ways \u2013 and we certainly don\u2019t want to put an end to that. But organizations must think carefully about the security implications of these apps and the sensitive data that\u2019s being shared within and across them. In his piece, Tal explains that an approach based on self-supervised learning can help improve an organization\u2019s security posture by providing a more agile and context-aware approach to security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-21T11:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-21T23:10:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2019\/05\/Security_SHUTTERSTOCK.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"186\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/\",\"url\":\"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/\",\"name\":\"SaaS Security Requires Self-Supervised Learning with Context - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2023-06-21T11:00:00+00:00\",\"dateModified\":\"2023-06-21T23:10:45+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SaaS Security Requires Self-Supervised Learning with Context\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\",\"name\":\"Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"caption\":\"Editorial Team\"},\"sameAs\":[\"http:\/\/www.insidebigdata.com\"],\"url\":\"https:\/\/insidebigdata.com\/author\/editorial\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SaaS Security Requires Self-Supervised Learning with Context - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/","og_locale":"en_US","og_type":"article","og_title":"SaaS Security Requires Self-Supervised Learning with Context - insideBIGDATA","og_description":"In this contributed article, Tal Shapira, Ph.D., co-founder and chief scientist at Reco, discusses the need for self-supervised learning to combat the growing attack surface that SaaS-based applications have opened up for organizations. SaaS tools and applications have revolutionized the workplace in many ways \u2013 and we certainly don\u2019t want to put an end to that. But organizations must think carefully about the security implications of these apps and the sensitive data that\u2019s being shared within and across them. In his piece, Tal explains that an approach based on self-supervised learning can help improve an organization\u2019s security posture by providing a more agile and context-aware approach to security.","og_url":"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2023-06-21T11:00:00+00:00","article_modified_time":"2023-06-21T23:10:45+00:00","og_image":[{"width":300,"height":186,"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2019\/05\/Security_SHUTTERSTOCK.jpg","type":"image\/jpeg"}],"author":"Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Editorial Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/","url":"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/","name":"SaaS Security Requires Self-Supervised Learning with Context - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2023-06-21T11:00:00+00:00","dateModified":"2023-06-21T23:10:45+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2023\/06\/21\/saas-security-requires-self-supervised-learning-with-context\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"SaaS Security Requires Self-Supervised Learning with Context"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9","name":"Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","caption":"Editorial Team"},"sameAs":["http:\/\/www.insidebigdata.com"],"url":"https:\/\/insidebigdata.com\/author\/editorial\/"}]}},"jetpack_featured_media_url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2019\/05\/Security_SHUTTERSTOCK.jpg","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-8vb","jetpack-related-posts":[{"id":1422,"url":"https:\/\/insidebigdata.com\/2012\/05\/05\/big-data-and-the-fall-of-saas\/","url_meta":{"origin":32685,"position":0},"title":"Big Data and the Fall of SaaS","date":"May 5, 2012","format":false,"excerpt":"Over at TechCrunch, Raj De Datta from BloomReach writes that Big Data Applications (BDAs) will become the new behemoths of IT. BDA companies create value differently than SaaS companies. BDA companies are built by teams of people with a strong background in large-scale systems and machine learning \/ data mining\u2026","rel":"","context":"In &quot;Big Data Software&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":33273,"url":"https:\/\/insidebigdata.com\/2023\/09\/04\/it-leaders-craving-insights-on-generative-ai-use-finds-new-snow-software-saas-management-survey\/","url_meta":{"origin":32685,"position":1},"title":"IT Leaders Craving Insights on Generative AI Use, Finds New Snow Software SaaS Management Survey","date":"September 4, 2023","format":false,"excerpt":"Snow Software, a leader in technology intelligence, unveiled new data suggesting IT leaders are grappling with anxiety over the risks of generative AI despite continued confidence in their software-as-a-service (SaaS) security posture. The latest study, which surveyed 1,000 IT leaders, looks at shifting challenges and opportunities facing IT leaders managing\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/06\/GenerativeAI_shutterstock_2284999159_special.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":25565,"url":"https:\/\/insidebigdata.com\/2021\/01\/31\/saas-data-ownership-the-key-to-data-protection-and-more-impactful-machine-intelligence\/","url_meta":{"origin":32685,"position":2},"title":"SaaS Data Ownership: The Key to Data Protection and More Impactful Machine Intelligence","date":"January 31, 2021","format":false,"excerpt":"In this special guest feature, Joe Gaska, Founder and CEO of GRAX, discusses how SaaS data ownership is the key to data protection and more impactful machine intelligence. Also provided are three simple guideposts that can quickly tell an organization if they have found the right tool for the job.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2021\/01\/JoeGaska-headshot.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":17193,"url":"https:\/\/insidebigdata.com\/2017\/02\/17\/sumo-logic-delivers-multi-tenant-saas-security-analytics-solution-integrated-threat-intelligence\/","url_meta":{"origin":32685,"position":3},"title":"Sumo Logic Delivers Multi-Tenant SaaS Security Analytics Solution with Integrated Threat Intelligence","date":"February 17, 2017","format":false,"excerpt":"Sumo Logic, a leading cloud-native, machine data analytics service, announced the availability of the industry\u2019s first multi-tenant SaaS security analytics solution with integrated threat intelligence. This, coupled with new security apps for monitoring and compliance and a milestone certification for PCI DSS 3.2, demonstrates Sumo Logic\u2019s strong momentum and commitment\u2026","rel":"","context":"In &quot;Analytics&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":22144,"url":"https:\/\/insidebigdata.com\/2019\/02\/17\/r2-ai-launches-saas-based-automl-tool-to-drive-mass-ai-adoption\/","url_meta":{"origin":32685,"position":4},"title":"R2.ai Launches SaaS-based AutoML Tool to Drive Mass AI Adoption","date":"February 17, 2019","format":false,"excerpt":"R2.ai, which enables businesses and individuals to develop AI solutions on their own, announced the availability of its software as a service (SaaS) offering. Originally an on-premise solution, R2.ai\u2019s new SaaS platform makes it easier for a broader range of businesses and individuals to develop and deploy AI with little\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12855,"url":"https:\/\/insidebigdata.com\/2015\/03\/11\/insidebigdata-guide-hyperscaling-saas-infrastructure\/","url_meta":{"origin":32685,"position":5},"title":"insideBIGDATA Guide to Hyperscaling Your SaaS Infrastructure","date":"March 11, 2015","format":false,"excerpt":"In this new Guide to Hyperscaling Your SaaS Infrastructure the goal is to provide direction for SaaS company thought leaders on ways to achieve higher levels of scalability and performance through use of in-memory computing technology.","rel":"","context":"In &quot;Featured&quot;","img":{"alt_text":"insideBIGDATA_Guide_Hyperscale_Fig1","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2015\/03\/insideBIGDATA_Guide_Hyperscale_Fig1.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/32685"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10513"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=32685"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/32685\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media\/22592"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=32685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=32685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=32685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}